In an earlier question (Issues Configuring LDAP Authentication), I was unable to successfully authenticate to LDAP. I was able to resolve that issue, but now I’m having issues mapping AD groups to backend-role equivalents.
I.e., I’ve created the following roles in Search Guard by duplicating built-in roles from within the GUI and mapping them to the following backend roles (AD groups):
Role | Duplicates | Backend Role (AD Group) |
---|---|---|
APP-ELK-Admin |
SGS_ALL_ACCESS |
APP-ELK-Admin |
APP-ELK-User |
SGS_KIBANA_USER |
APP-ELK-User |
As you can see, I named the roles and mappings identically to the AD groups, for simplicity.
When users attempt to login, they get the following:
-
APP-ELK-Admin
: Users in this group are able to login, but do not appear to have admin privileges (i.e., they are unable to see the Search Guard plugin in the left-hand toolbar and cannot update role configurations). -
APP-ELK-User
: Users in this group are unable to login, they get a403/Forbidden
.
I’ve included the definitions from the two files below:
sg_roles.yml
# Direct copy of SGS_ALL_ACCESS
APP-ELK-Admin:
reserved: false
hidden: false
description: "Allow full access to all indices and all cluster APIs"
cluster_permissions:
- "*"
index_permissions:
- index_patterns:
- "*"
fls: []
masked_fields: []
allowed_actions:
- "*"
tenant_permissions:
- tenant_patterns:
- "*"
allowed_actions:
- "*"
static: false
# Direct copy of SGS_KIBANA_USER
APP-ELK-User:
reserved: false
hidden: false
description: "Provide the minimum permissions for a kibana user"
cluster_permissions:
- "SGS_CLUSTER_COMPOSITE_OPS"
index_permissions:
- index_patterns:
- ".kibana"
- ".kibana-6"
- ".kibana_*"
fls: []
masked_fields: []
allowed_actions:
- "SGS_DELETE"
- "SGS_INDEX"
- "SGS_MANAGE"
- "SGS_READ"
- index_patterns:
- "*:.management-beats"
- "*:.tasks"
- ".management-beats"
- ".tasks"
fls: []
masked_fields: []
allowed_actions:
- "SGS_INDICES_ALL"
tenant_permissions: []
static: false
sg_roles_mapping.yml
APP-ELK-Admin:
reserved: false
hidden: false
backend_roles:
- "APP-ELK-Admin"
hosts: []
users: []
and_backend_roles: []
description: ""
APP-ELK-User:
reserved: false
hidden: false
backend_roles:
- "APP-ELK-User"
hosts: []
users: []
and_backend_roles: []
description: ""